Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • Cloud Console
          Cloud Console
          Compliance
          Compliance

      • Column 2
        • Global Regions
          Cloud Regions
          Catalyst
          Planning and Assessment

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Veeam Backup
      • Microsoft 365 Backup
      • Managed Backup for Cohesity
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • DRaaS for Azure
      • Autopilot
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Cloud Console
    • Compliance
    • Cloud Regions
    • Planning and Assessment
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • Autopilot
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Tags: Disaster Recovery
Author: Justin Augat
Date: June 23, 2020

Plan. Prepare. Protect. 2020 hurricane season is here.

 
As if we needed another challenge in 2020, the Atlantic hurricane season is expected to be “busy” according to the NOAA Climate Prediction Center. What does this mean? From a probability standpoint, the outlook “predicts a 60% chance of an above-normal season, a 30% chance of a near-normal season and only a 10% chance of a below-normal season.” The Atlantic hurricane season runs from June 1 through November 30.

With an above-normal likelihood of a storm, it’s time to run through your IT protection and recovery checklist to ensure you are prepared for potential data loss or downtime:

  1. Plan. In general, the more you can plan, the easier and more successful the recovery will be. Documenting your IT disaster recovery plan should be required. This document will spell out what needs to happen before, during and after a disaster event to resume business operations.Considerations for this document include roles and responsibilities, contact information, asset inventory and stack-ranked (if possible) systems and applications in terms of business priority/value. You should also document the steps to restore data from backups and/or recover (failover/failback) from catastrophic IT loss. Finally, you must communicate the plan out to all key stakeholders. The fewer surprises the better in the event of a disaster.

  2. Prepare. If you currently operate a traditional primary/secondary data center strategy for backup and recovery, TEST your solutions now to ensure your primary site is protected and your secondary site is capable of running your business. In other words, in the event of a primary site disaster, does your secondary site have all the resources needed for vital operations? Is it backed up in case of local failure (i.e. hardware failure)? Is it secure? Can it perform as expected? Remember, with DR, your secondary site BECOMES your primary site.If you do not have a secondary site, you need to evaluate your protection and recovery strategy ASAP. See the next topic for details.

  3. Protect. As above, if you do not have a backup or recovery strategy, you need to implement an offsite solution now to ensure your business is protected. While there are many approaches to this, cloud services play a key role in backup and disaster recovery strategies due to the ability to:

    • Implement backup and recovery capabilities at a location that is an appropriate physical distance from your primary site (i.e. leveraging a cloud service that has a data center 500+ miles from your primary site or in a different geography).
    • The ability to deploy, test and restore and recover quickly, with or without professional services support.
    • Cost efficiencies of cloud services vs. traditional data center ownership and management.

Having been in the backup and disaster recovery business for over a decade, 11:11 Systems has helped customers protect and recover their IT infrastructure from some of the most destructive hurricanes in US history. For more information, see the following recent content (with abstracts):

  • How to Sell “Disaster Recovery” to Senior Management Are you having trouble selling DR to your senior management? Check out our latest white papers which will give you strategies to communicate the importance of DR and get you on the same page. These strategies include:

    • Striking the use of the term “disaster” from your vocabulary
    • Making sure management understands the ROI of IT Recovery.
    • Speaking about DR the right way — in terms of risk mitigation.
    • Pointing management towards a specific solution.
  • The Essential Guide to Cloud-based Backup and Disaster Recovery When disaster strikes, whether large or small, your job is to keep things up and running. You need to build a plan of action. So, where do you start? You may need a backup solution. You may need a disaster recovery solution. Or, you may need a bit of both. Read this white paper to help begin building your backup and DR plan.

  • Be sure to check out our DRaaS data-sheets for vendor-specific information. In all cases, 11:11 works with these providers to develop solutions that satisfy your unique Recovery Point and Recovery Time Objectives.

    • DraaS with Veeam

    • DraaS with Zerto

    • Autopilot Managed Recovery

  • 11:11 Disaster Recovery as a Service (DRaaS) Overview and Console Demo In today’s 24/7 IT world, being always available for your internal and external customers is a must. Disaster Recovery in the past has been challenging due to cost, complexity, and technology. Cloud offers a scalable, high-performing, and cost-effective solution to help any organization meet their DR initiatives. See how 11:11’s Secure Cloud Console along with it’s DRaaS offering combines to give you ultimate visibility and management into a DR solution that has automation and orchestration, security and compliance, test and live failover capabilities, and a pay as you use consumption model all delivered through a unified interface.

Categories: DRaaS, Veeam, ZertoBy Justin AugatJune 23, 2020
Tags: Disaster Recovery

Author: Justin Augat

Justin Augat worked on the 11:11 Systems product marketing team.

Post navigation

PreviousPrevious post:11:11 Systems and Veeam10NextNext post:Is your data ready for 2021?

Related Posts

Protecting Microsoft Teams Channel Chat Data: Are You Prepared?
March 15, 2023
Veeam 12
Veeam 12: Appropriate Direct to Object Storage Use Cases
February 15, 2023
Veeam 12
Veeam 12 Preview: Veeam Cloud Connect Backup vs. Object Storage
February 14, 2023
Veeam 12
Veeam 12 Preview: Multi-Factor Authentication
February 7, 2023
Veeam 365 Backup v7 BETA: SaaSy Immutability
February 2, 2023
Preparing for 2023 with 11:11 Systems: IT Trends in Security, Cloud, and More
February 1, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice

Go to Top
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information that allows us to process data such as browsing behavior. Not consenting or withdrawing consent, may adversely affect certain features and functions. By clicking Accept, closing this message, or continuing to browse, you consent to these technologies and accept our Privacy Notice.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}